Wรคrtsilรค Energy Storage Announces GEMS Pulse, A Predictive Analytics Solution
cleantechnica.comยท1d
๐Ÿ”Cybersecurity
Flag this post
Show HN: I built an edge ML system to detect and classify trick-or-treaters
basecase.vcยท1dยท
Discuss: Hacker News
๐ŸPython
Flag this post
Calculating the spreading of fluids in porous materials to understand saltwater in soil
phys.orgยท8h
๐ŸPython
Flag this post
Ground zero: 5 things to do after discovering a cyberattack
welivesecurity.comยท1d
๐ŸฆˆWireshark
Flag this post
Benchmarking the cost of Java's EnumSet - A Second Look
kinnen.deยท6hยท
Discuss: r/programming
๐Ÿ”ฌReverse Engineering
Flag this post
SesameOp Backdoor Uses OpenAI API for Covert C2
darkreading.comยท10h
๐ŸŽฏPenetration Testing
Flag this post
Health privacy bill seeks protections for data collected by apps, smartwatches
discuss.privacyguides.netยท5h
๐ŸฆˆWireshark
Flag this post
Building a Privacy-First Log Analyzer for Banking QA: The Technical Architecture
dev.toยท3dยท
Discuss: DEV
๐ŸŽฏPenetration Testing
Flag this post
Building Resilient Defenses: A Practical Guide to Modern DDoS Attack Mitigation
dev.toยท22hยท
Discuss: DEV
๐ŸงฑFirewalls
Flag this post
Show HN: Polyglot standard library HTTP client C/C++/Rust/Python and benchmarks
github.comยท20hยท
Discuss: Hacker News
๐ŸฆˆWireshark
Flag this post
Predicting & Mitigating Data Corruption in Pure Storage Flash Arrays via Adaptive Bit Error Rate Modeling
dev.toยท14hยท
Discuss: DEV
๐Ÿ”ฌReverse Engineering
Flag this post
Backend Engineer & MLOps Lead (Temporary Assignment)
dev.toยท9hยท
Discuss: DEV
๐ŸงLinux
Flag this post
Transformer-Based Decoding in Concatenated Coding Schemes Under Synchronization Errors
arxiv.orgยท20h
๐ŸฆˆWireshark
Flag this post
Extensive FPGA and ASIC resource comparison for blind I/Q imbalance estimators and compensators
sciencedirect.comยท10h
๐Ÿ›ฃ๏ธBGP
Flag this post
H-FA: A Hybrid Floating-Point and Logarithmic Approach to Hardware Accelerated FlashAttention
arxiv.orgยท20h
๐ŸPython
Flag this post
DOGE Prints Lower-Low Sequence as $0.17 Resistance Locks In
coindesk.comยท7h
๐Ÿ”Cybersecurity
Flag this post
Hackers Weaponize Remote Tools to Hijack Cargo Freight
darkreading.comยท1d
๐Ÿ”Cybersecurity
Flag this post